Technology/Science
Cambridge Mobile Telematics Partners With Aioi Nissay Dowa Insurance to Develop Behavior-Based Telematics Program
Cambridge Mobile Telematics (CMT) and Aioi Nissay Dowa Insurance (ADI), a global insurance company, have formed a strategic partnership to bring a behavior-based telematics program to Japan. ...
Bitcoin Exchanges Face Growing Cyber Hacking Risks
When hackers penetrated a secure authentication system at a bitcoin exchange called Bitfinex earlier this month, they stole about $70 million worth of the virtual currency. The cyber theft -- the ...
Europe Flood Risk: A New Growth Opportunity for the Industry
Flood events are not restricted by geopolitical borders. In a landmass with multiple adjacent countries such as Europe, flood risk can have a wide-reaching impact on both business and ...
Are Wearable Clouds the Next Innovation in Data Storage?
Researchers at the University of Alabama at Birmingham are exploring the concept of a wearable personal cloud — a fully functioning, yet compact and lightweight cloud computing system embedded into ...
The Hanover Launches Pay-As-You-Go Option for Workers Comp
The Hanover Insurance Group has launched a new pay-as-you-go option for workers compensation policies that allows insureds to pay their premiums in real time, based on payroll. Hanover EZPay gives ...
Southwest U.S. Methane Hot Spots Come From Natural Gas Leaks, Scientists Report
A puzzling concentration of the greenhouse gas methane over the Southwestern United States appears to come mostly from leaks in natural gas production, scientists said Monday. Researchers identified ...
How a Solar Storm Almost Sparked a Nuclear War
A solar storm that jammed radar and radio communications at the height of the Cold War could have led to a disastrous military conflict if not for the U.S. Air Force's budding efforts to monitor the ...
Cyber Terrorism a Major Concern for U.S. Businesses
U.S. businesses focused on addressing crisis management in the event of an on-premise terrorist attack may be leaving their information systems vulnerable to a cyber attack. According to The Global ...

